Menu

Evaluate Cloud Service Providers

Verification against Criteria

International Organization for Standardization/International Electrotechnical Commission

ISO 27017 was built from ISO 27002, adding 7 controls related to cloud services. Although, not a requirement to follow this standard in some parts of the world, following this standard can help address a wide swath of data protection and privacy standards from other nations such as GDPR. The ISO standard has a world-wide acceptance and provide a excellent framework for developing cloud services.

Payment Card Industry Data Security Standard

PCI is a requirement for organizations that want to accept cards for payment. It includes 12 requirements, but the cloud is only referenced once and refers to shared hosting requirements summarized as:

  • Ensure that a customer’s processes can only access their data environment.
  • Restrict customer access and privileges to their data environment.
  • Enable logging and audit trails that are unique to each environment, consistent with requirement 10.
  • Provide processes to support forensic investigations.

System/subsystem Product Certifications

Common Criteria

Common Criteria provides assurance that the process of specification, implementation and evaluation of a computer security product has been conducted in a rigorous and standard and repeatable manner at a level that is commensurate with the target environment for use.

FIPS 140-2

Businesses wanting to do business with the U.S. Government need to be FIPS 140-2 compliant. From NIST:

This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.

FIPS requires that encryption, hashing, and message authentications use algorithms from an approved list.